A rekey-boosted security protocol in hierarchical wireless sensor network

Yi Ying Zhang, Wen Cheng Yang, Kee Bum Kim, Min Yu Cui, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics of WSN, such as restricted resources and operation in a hostile environment, WSNs are subjected to numerous threats and are vulnerable to attacks. In this paper, we present a rekey-boosted security protocol in LEACH (RBS-LEACH) to enhance network security and survivability. Compared to other LEACH security solutions, the salient advantage of this work is that a unique rekey mechanism, which can efficiently protect the network against attacks of eavesdropping or captured nodes compromise, is adopted to address challenging security issues of runtime WSN. Even if the adversaries crack WSN keys, the entire network still remains safe under the timely protection of the rekey mechanism.

Original languageEnglish
Title of host publicationProceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008
Pages57-61
Number of pages5
DOIs
Publication statusPublished - 2008
Event2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008 - Busan, Korea, Republic of
Duration: 2008 Apr 242008 Apr 26

Publication series

NameProceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008

Other

Other2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008
Country/TerritoryKorea, Republic of
CityBusan
Period08/4/2408/4/26

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'A rekey-boosted security protocol in hierarchical wireless sensor network'. Together they form a unique fingerprint.

Cite this